My father Pulin Babu lived and died for Indigenous Aboriginal Black Untouchables. His Life and Time Covered Great Indian Holocaust of Partition and the Plight of Refugees in India. Which Continues as continues the Manusmriti Apartheid Rule in the Divided bleeding Geopolitics. Whatever I stumbled to know about this span, I present you. many things are UNKNOWN to me. Pl contribute.
Palash Biswas

COOP : India, Ghana To Join Hands To Fight Cyber CrimesMATRIX : How Wi-Fi attackers are poisoning Web browsersTEAM-UP : Google team up with NSA in cyberattack probeSTEAL : Hackers Steal Millions in Carbon CreditsIT Term of the dayQuote of the day

-- You received this message because you are subscribed to the Google Groups "control-computer-crimes" group.To post to this group, send email to control-computer-crimes@googlegroups.com.To unsubscribe from this group, send email to control-computer-crimes+unsubscribe@googlegroups.com.For more options, visit this group at http://groups.google.com/group/control-computer-crimes?hl=en.

New Delhi, India (AHN) - India has sought Ghana's help in fighting cyber crime in order to prevent innocent people from being duped by lucrative job offers.

The interior minister of Ghana, Cletus Avoka assured his government's willingness to extend cooperation in the matter to India's overseas Indian affairs minister Vayalar Ravi who was in the West African country Ghana as part of his tour of African countries from Jan. 29 to Feb. 6.

Ravi expressed his satisfaction to Avoka over the prompt action taken by Ghana in addressing the security concerns of the Indian community living in Ghana.

During his Ghana visit, Ravi also held a meeting with John Evans Atta Mills, president of Ghana and discussed various bilateral issues between the two countries.

Ravi also attended an event organized by the Indian Association of Ghana where he elaborated on the measures that the Indian government was taking in order to strengthen the cultural and economic bond between India and its diaspora around the world.

Public Wi-Fi networks such as those in coffee shops and airports present a bigger security threat than ever to computer users because attackers can intercede over wireless to "poison" users' browser caches in order to present fake Web pages or even steal data at a later time.That's� according to security researcher Mike Kershaw, developer of the Kismet wireless network detector and intrusion-detection system, who spoke at the Black Hat conference.

He said it's simple for an attacker over an 802.11 wireless network to take control of a Web browser cache by hijacking a common JavaScript file, for example.

"Once you've left Starbucks, you're owned. I own your cache-control header," he said. "You're still loading the cache JavaScript when you go back to work.

"Open networks have no client protection," said Kershaw, who also uses the handle Dragorn. "Nothing stops us from spoofing the [wireless access point] and talking directly to the client," the user's Wi-Fi-enabled device.

Knowledge gained from researchers over the past year, he said, is showing that browser-cache poisoning over Wi-Fi can be kept in a persistent state unless the user knows how to effectively empty the cache.

"Once the cache is poisoned, it's going to stay there," Kershaw said. This means that an attacker can intercede to "poison the URL" of the victim so that he will see a fake Web page when they try to visit a specific Web site or try to insert a "shim" that could "ship your internal pages off to a remote server once you're in a VPN."

The few defenses Kershaw suggested were continuously manually clearing the cache, or using private-browser mode. "Who knows how to clear the browser cache in an iPhone?" he asked.

Kershaw acknowledged he doesn�t know how widely attacks based on poisoning the browser cache via 802.11 actually are. But the potential for trouble is so evident he said he'd advise corporate security professionals to try to "forbid users from taking laptops onto open networks," though he admitted, "Your users may lynch you." He said some vendors, including Verizon, are looking at solving this problem with a custom client that is tied to specific operating systems.

WASHINGTON (Reuters) � Internet search firm Google is finalizing a deal that would let the National Security Agency help it investigate a corporate espionage attack that may have originated in China, the Washington Post reported on Thursday.

The aim of the investigation is to better defend Google, the world's largest Internet search company, and its users from future attacks, the Post said, citing anonymous sources with knowledge of the arrangement.

The sources said Google's alliance with the NSA -- the intelligence agency is the world's most powerful electronic surveillance organization -- would be aimed at letting them share critical information without violating Google's policies or laws that protect the privacy of online communications.

"NSA is not able to comment on specific relationships we may or may not have with U.S. companies," the agency said in a statement.

As a general matter, "NSA works with a broad range of commercial partners and research associates" on security solutions for the Defense Department and other customers and on "cutting-edge technologies that will secure the information systems of tomorrow," the statement said.

Under the arrangement, the NSA would not be viewing user searches or e-mail accounts, the Washington Post said. Google also would not be sharing proprietary data with the NSA, the newspaper's sources said.

Google took the unusual step on January 12 of announcing that it had been hit by sophisticated cyberattacks in mid-December and that it was reviewing its business operations in China.

The Silicon Valley-based firm said the cyberattacks targeted Gmail accounts of Chinese human rights activists and an investigation found at least 20 other large companies had been targeted by cyberattacks.

China responded several days later with a defense of its state control of the Internet. A top official said online pornography, fraud and rumors were a menace and that Internet media must help "guide public opinion" in China.

U.S. Director of National Intelligence Dennis Blair said on Tuesday the cyberattacks against Google were a wake-up call.

A partnership between the Internet search giant and the NSA touches on the sensitive issue of how to balance individual privacy and national security online.

Google approached the NSA in the aftermath of the attacks, but reaching an agreement has taken weeks because of the sensitive nature of information-sharing between the two sides, the Post quoted its sources as saying.

The focus of the cooperative venture would not be to determine who was behind the attacks, the newspaper added, citing its sources. That would be nearly impossible.

Instead the aim is to build a better defense of Google's networks, or what technicians call "information assurances," the newspaper quoted the sources as saying.

That�s exactly what hackers went after last week when they obtained unauthorized access to online accounts where companies maintain their carbon credits, according to the German newspaper Der Spiegel.

The hackers launched a targeted phishing attack against employees of numerous companies in Europe, New Zealand and Japan, which appeared to come from the German Emissions Trading Authority. The workers were told that their companies needed to re-register their accounts with the Authority, where carbon credits and transactions are recorded.

When workers entered their credentials into a bogus web page linked in the e-mail, the hackers were able to hi-jack the credentials to access the companies� Trading Authority accounts and transfer their carbon credits to two other accounts controlled by the hackers.

Under environmental cap-and-trade laws, there�s a limit to the greenhouse gases companies can emit. Companies that exceed this limit can purchase so-called carbon credits from entities that produce fewer greenhouse emissions than the limit provides them.

The scheme has produced a robust market for the trade of credits. More than 8 million tons of CO2 emissions worth $130 billion were traded in Europe last year.

According to the BBC, it�s estimated the hackers stole 250,000 carbon credit permits from six companies worth more than $4 million. At least seven out of 2,000 German firms that were targeted in the phishing scam fell for it. One of these unidentified firms reportedly lost $2.1 million in credits in the fraud.

The credits were resold for an undisclosed sum. The buyers, who likely believed the transactions were legitimate, haven�t been named.

The German Emissions Trading Authority has suspended access to its databases for a week while an investigation is underway.

The fraud is the latest example of hacks aimed at gaming environment controls. A year ago, hackers penetrated the Brazilian government�s quota data for Brazilian rain forest products � allowing the illegal poaching of more than 1.7 million cubic feet of timber.

New IT Term of the day

social networking site

Abbreviated as SNS a social networking site is the phrase used to describe any Web site that enables users to create public profiles within that Web site and form relationships with other users of the same Web site who access their profile. Social networking sites can be used to describe community-based Web sites, online discussions forums, chatrooms and other social spaces online.

As a member of this group, you get useful information to protect yourself and your IT assets and processes from various Computer and Related Crimes.

If you think that your other friends/colleagues/acquaintances/relatives/foes/enemies also needs this information, forward the mail to them and request them to send their e-mail addresses and names to us with subject as "Subscribe".

If you or someone has become victim of Computer Crimes or has any query on prevention, you are welcome to write to us.

If you arenot interested in it and would like to unsubscribe - send a reply mail with subject as "Unsubscribe".

Disclaimer - We have taken due care to research and present these news-items to you. Though we've spent a great deal of time researching these matters, some details may be wrong. If you use any of these items, you are using at your risk and cost. You are required to verify and validate before any usage. Most of these need expert help / assistance to use / implement. For any error or loss or liability due to what-so-ever reason, CRPCC and/or Sysman Computers (P) Ltd. and/or any associated person / entity will not be responsible.

The Voice of the Persecuted Nationalities Denied ...

Politics, Economics and the GLOBE

Marxist and the Gandhi

Dharmaveer

Dharamaveer, then Governor of Bengal 9second from Left) with Jyoti basu, deputy CM, Mrs Indira gandhi, PM and Ajoy Mukherjee , CM. Dharamveer belonged to Dhramanagari in Bijnore, Sabita`s maternal Home. Bengali Refugees in Bijnore had been resettled in the State of King Jwala Prasad. Dharmaveer was the Eldest PRINCE of the State

Marichjhanpi Massacre, First genocide by the Marxist Brahaminical Hegemony

Peasant Uprising

Mahendra singh Tikait, the leader of bharatiya Kisan Union and me during the Massive Rally under Peasant uprising in western UP

The Poet with Us

Baba nagarjun the Poet at our Amravati residence where he stayed with us. From Left Shobhakant , the youngest son of the Poet, Me ,Baba and Sabita

Me and Sabita in Home Town

Me and sabita in our Home Town Nainital after our marriage

Cancer Ward

ND Tiwari assureing my Dying father who later succumbed to Cancer in 2001 that he would establish a canser Hospital as my father wished last. Tiwari never Visited Basantipur after my Father`s death and simply forgot about the hospital

MIli and Subhash with the Poet

Mili, My cousin Subhash `s Wife, who died succumbing to Septosemia in NRS Hospital on first May 1995, Subhsh, Me and Sabita with the Prominet Hindi Poet Baba Nagarjun who also died later flanked by Left Totan , only son of Mili and subhsh and Tussu. Baba satyed with us in 1992

Generation Next

From Left, Biplab , the eleder Son of Padmalochan my brother, Tussu my son and Tutul, the yonger son of Lochan. Biplabis no more as heexpired on 25th May 1991, four days after the death of rajiv Gandhi in Bomb Blast. biplab sucumbed to Fever at aged only Six

Meeradi

My eldest cousin Meeradi with her Grand son shivanand who is a Young Man but Deaf and dumb

My villagers

My Villagers during the last journey of their Comrade, and head of the Village family, Pulin Babu

Last Rites

We all brothers and boys at home during Last Rites of my father while Jethamoshai looks on

FRIENDS in DSB

Me9thirdfrom left with DSB Friends in seventies

JETHAMOSHAI

My Father`s elder Brother

ND Tiwar at Home

ND Tiwari on the Death Bed of his Close Friend, my Father accepts ISHWAR KI Galti